Tips for Conducting a Trade Secret Assessment with Rob Jensen
Safeguarding Your Business Data
Trade Secrets in Hollywood: Lessons from Oscar-Nominated Films - Employment Law This Week® - Spilling Secrets Podcast
#WorkforceWednesday®: Trade Secret Litigation - Lessons from High-Stakes Group Exits - Spilling Secrets Podcast - Employment Law This Week®
New Developments in Health Information Policy
#WorkforceWednesday®: 2024’s Biggest Trade Secrets and Non-Compete Developments - Spilling Secrets Podcast - Employment Law This Week®
Key Discovery Points: Lessons Learned from TikTok’s Redaction Fiasco
#WorkforceWednesday®: Beyond Non-Competes - IP and Trade Secret Assessment Strategies for Employers - Spilling Secrets Podcast - Employment Law This Week®
4 Tips for Protecting Your AI Products
6 Things To Consider Before Litigation
#WorkforceWednesday®: Wizarding and the World of Trade Secrets - Spilling Secrets Podcast - Employment Law This Week®
What's the Tea in L&E? Can You Share An Employee's Medical Info?
Exploring Employment Law Across Borders: Italy vs. US With White Lotus — Hiring to Firing Podcast
Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
JONES DAY PRESENTS®: Employer Options in a Non-Noncompete World
California Employment News: Understanding the Basics of Employee Personnel Files (Featured Podcast)
California Employment News: Understanding the Basics of Employee Personnel Files (Featured)
What's the Tea in L&E? Employee Devices: What is #NSFW?
Work This Way: A Labor & Employment Law Podcast - Episode 25: Issues for Public Employers with Bertha Enriquez of Renewable Water Resources
Trade Secret Litigation: The Power of Protection
Information leaks pose a growing and multifaceted risk to organizations across sectors. While often associated with cybersecurity breaches, the majority of such incidents stem from human error or intentional misconduct. On 25...more
Working on the go has become a necessity for many, but it should never come at the expense of confidentiality. Julie Savarino explains....more
On May 5, the OIG for the Fed authored a report with several recommendations for the CFPB following a major security incident regarding confidential supervisory information (CSI). The OIG issued four findings with seven...more
Last week’s NFL draft highlighted more than the accomplishments of athletes at the combine or on the field. While there was extensive coverage of the merits of each player, one of the major headlines coming out of the draft...more
Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more
Trial outcomes often hinge on witness testimony. Attorneys collect much of this testimony during a formal process called a deposition. A critical component of discovery, depositions traditionally occur in law offices or...more
In recent years, many organizations have implemented new policies on artificial intelligence (AI) use to help prevent bias, plagiarism, or use of AI tools that produce inaccurate or misleading information. Meanwhile, many...more
For companies, maintaining a competitive advantage over the market is necessary for long-term growth. In many cases, this competitive advantage takes the form of a federal- or state-protected trade secret, such as a...more
Law firms handle confidential information and documents that require diligent protection. The stakes are high, the regulations and their sources are vast, and technology is sophisticated and ever-changing....more
Insider threats continue to present a significant challenge for organizations of all sizes. One particularly concerning scenario involves employees who leave an organization and impermissibly take or download sensitive...more
Due diligence is a necessary part of any M&A transaction. This process can be an exhaustive deep dive into the target company’s history. In some cases, the buyer wants to assure itself of certain highly confidential and...more
China’s ByteDance, the parent company of TikTok, is seeking USD1.1 million in damages from a former intern accused of sabotaging its artificial intelligence (AI) large language model training infrastructure....more
On August 14, Judge Corrigan for the Middle District of Florida, in Properties of the Villages vs. FTC, found that the FTC did not have the authority to enter its planned Noncompete Rule, and entered an order granting an...more
The NY State Bar Association (NYSBA) Task Force on Artificial Intelligence has issued a nearly 80 page report (Report) and recommendations on the legal, social and ethical impact of artificial intelligence (AI) and generative...more
The healthcare industry is a major target for cyberattacks because of all of the personal information collected from patients. Recognizing that the healthcare industry is such a ripe hunting ground for cybercriminals, the...more
For the second year in a row, the manufacturing industry has fallen victim to more cyberattacks than any other major business sector. Indeed, according to IBM Security’s X-Force Threat Intelligence Index, nearly 25 percent...more
The questions below are intended to help in-house counsel obtain the most important information related to technology projects so they can evaluate risks to the company’s data, intellectual property, and commercial interests,...more
Despite strengthening security across and beyond the business, many legal organizations overlook a critical vulnerability with surprising frequency – the risk presented by third parties. Cybersecurity risk is further...more
Data breaches by large companies have been in the news for some time. Over the last several years several companies, including Marriott, Yahoo and Volkswagon, have been victimized by hackers who have broken into a company’s...more
Law firms are prime targets for hackers. Why? Because their computer networks contain highly concentrated, high-value information about many parties that is often not well-protected. One often-overlooked vulnerability is the...more
In Formal Opinion 498, issued on March 10, 2021, the American Bar Association’s Standing Committee on Ethics and Professional Responsibility has provided some guidance on the ethical obligations triggered when a lawyer...more
Happy Data Privacy Day! Since 2007, privacy professionals from across the globe have gathered together on January 28 to raise awareness about data privacy and security best practices and issues. ...more
Data breaches are a hot topic and will undoubtedly get even hotter. Cybersecurity for your own enterprise isn’t enough — you must evaluate your vendors and determine if they’re prepared to resist cyberattacks. ...more
HOW DID WE GET HERE? Business leaders are grappling with challenges which are unprecedented and which have not been witnessed on such a global scale previously. As COVID-19 spreads across the world, governments reacted by...more
For those with school age children, working from home now also means learning from home. In addition to your personal web surfing and emailing, separate your kids’ online school activities from a work-issued laptop and...more